* Default to upstream to self This is a backwards incompatible change. This is a massive (cleanup) PR where we default to resolving external names by the coredns process itself, instead of directly forwarding them to some upstream. This ignores any arguments `upstream` may have had and makes it depend on proxy/forward configuration in the Corefile. This allows resolved upstream names to be cached and we have better healthchecking of the upstreams. It also means there is only one way to resolve names, by either using the proxy or forward plugin. The proxy/forward lookup.go functions have been removed. This also lessen the dependency on proxy, meaning deprecating proxy will become easier. Some tests have been removed as well, or moved to the top-level test directory as they now require a full coredns process instead of just the plugin. For the etcd plugin, the entire StubZone resolving is *dropped*! This was a hacky (but working) solution to say the least. If someone cares deeply it can be brought back (maybe)? The pkg/upstream is now very small and almost does nothing. Also the New() function was changed to return a pointer to upstream.Upstream. It also returns only one parameter, so any stragglers using it will encounter a compile error. All documentation has been adapted. This affected the following plugins: * etcd * file * auto * secondary * federation * template * route53 A followup PR will make any upstream directives with arguments an error, right now they are ignored. Signed-off-by: Miek Gieben <miek@miek.nl> * Fix etcd build - probably still fails unit test Signed-off-by: Miek Gieben <miek@miek.nl> * Slightly smarter lookup check in upstream Signed-off-by: Miek Gieben <miek@miek.nl> * Compilez Signed-off-by: Miek Gieben <miek@miek.nl>
79 lines
1.6 KiB
Go
79 lines
1.6 KiB
Go
package test
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/miekg/dns"
|
|
)
|
|
|
|
func TestProxyThreeWay(t *testing.T) {
|
|
// Run 3 CoreDNS server, 2 upstream ones and a proxy. 1 Upstream is unhealthy after 1 query, but after
|
|
// that we should still be able to send to the other one.
|
|
|
|
// Backend CoreDNS's.
|
|
corefileUp1 := `example.org:0 {
|
|
erratic {
|
|
drop 2
|
|
}
|
|
}
|
|
`
|
|
|
|
up1, err := CoreDNSServer(corefileUp1)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
defer up1.Stop()
|
|
|
|
corefileUp2 := `example.org:0 {
|
|
whoami
|
|
}
|
|
`
|
|
|
|
up2, err := CoreDNSServer(corefileUp2)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
defer up2.Stop()
|
|
|
|
addr1, _ := CoreDNSServerPorts(up1, 0)
|
|
if addr1 == "" {
|
|
t.Fatalf("Could not get UDP listening port")
|
|
}
|
|
addr2, _ := CoreDNSServerPorts(up2, 0)
|
|
if addr2 == "" {
|
|
t.Fatalf("Could not get UDP listening port")
|
|
}
|
|
|
|
// Proxying CoreDNS.
|
|
corefileProxy := `example.org:0 {
|
|
proxy . ` + addr1 + " " + addr2 + ` {
|
|
max_fails 1
|
|
}
|
|
}`
|
|
|
|
prx, err := CoreDNSServer(corefileProxy)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
defer prx.Stop()
|
|
addr, _ := CoreDNSServerPorts(prx, 0)
|
|
if addr == "" {
|
|
t.Fatalf("Could not get UDP listening port")
|
|
}
|
|
|
|
m := new(dns.Msg)
|
|
m.SetQuestion("example.org.", dns.TypeA)
|
|
|
|
for i := 0; i < 10; i++ {
|
|
r, err := dns.Exchange(m, addr)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
// We would previously get SERVFAIL, so just getting answers here
|
|
// is a good sign. The actual timeouts are handled in the err != nil case
|
|
// above.
|
|
if r.Rcode != dns.RcodeSuccess {
|
|
t.Fatalf("Expected success rcode, got %d", r.Rcode)
|
|
}
|
|
}
|
|
}
|